Общая информация
Название [ CourseHulu.com ] LiveLessons - System and Privacy Data Protection
Тип
Размер 5.98Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
01-System and Privacy Data Protection - Introduction.en.srt 1.37Кб
01-System and Privacy Data Protection - Introduction.mp4 40.10Мб
02-Learning objectives.en.srt 492б
02-Learning objectives.mp4 16.48Мб
03-1.1 Privacy vs. Security.en.srt 8.96Кб
03-1.1 Privacy vs. Security.mp4 155.32Мб
04-1.2 Non-technical Controls.en.srt 9.11Кб
04-1.2 Non-technical Controls.mp4 120.71Мб
05-1.3 Classification, Ownership, Retention, and Data Types.en.srt 18.59Кб
05-1.3 Classification, Ownership, Retention, and Data Types.mp4 233.87Мб
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.en.srt 12.84Кб
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4 199.40Мб
07-1.5 Data Minimization, Purpose Limitation, and NDA.en.srt 2.33Кб
07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4 30.70Мб
08-1.6 Technical Controls.en.srt 1.79Кб
08-1.6 Technical Controls.mp4 21.06Мб
09-1.7 Encryption.en.srt 8.00Кб
09-1.7 Encryption.mp4 114.80Мб
10-1.8 Data Loss Prevention (DLP).en.srt 1.70Кб
10-1.8 Data Loss Prevention (DLP).mp4 10.32Мб
11-1.9 Data Masking and Deidentification.en.srt 4.96Кб
11-1.9 Data Masking and Deidentification.mp4 69.44Мб
12-1.10 Tokenization.en.srt 2.03Кб
12-1.10 Tokenization.mp4 24.58Мб
13-1.11 Digital Rights Management (DRM) and Watermarking.en.srt 5.79Кб
13-1.11 Digital Rights Management (DRM) and Watermarking.mp4 61.66Мб
14-1.12 Geographic Access Requirements.en.srt 3.97Кб
14-1.12 Geographic Access Requirements.mp4 52.03Мб
15-1.13 Access Controls.en.srt 1.84Кб
15-1.13 Access Controls.mp4 21.14Мб
16-Learning objectives.en.srt 499б
16-Learning objectives.mp4 18.03Мб
17-2.1 Business Impact and Risk Calculation.en.srt 1.72Кб
17-2.1 Business Impact and Risk Calculation.mp4 23.90Мб
18-2.2 Communication Risk Factors and Risk Prioritization.en.srt 9.55Кб
18-2.2 Communication Risk Factors and Risk Prioritization.mp4 120.55Мб
19-2.3 System Assessments.en.srt 6.56Кб
19-2.3 System Assessments.mp4 68.74Мб
20-2.4 Compensating Controls and Training - Part 1.en.srt 19.93Кб
20-2.4 Compensating Controls and Training - Part 1.mp4 207.90Мб
21-2.5 Compensating Controls and Training - Part 2.en.srt 13.94Кб
21-2.5 Compensating Controls and Training - Part 2.mp4 151.52Мб
22-2.6 Supply Chain Assessment.en.srt 7.33Кб
22-2.6 Supply Chain Assessment.mp4 60.91Мб
23-Learning objectives.en.srt 517б
23-Learning objectives.mp4 17.95Мб
24-3.1 Frameworks.en.srt 3.85Кб
24-3.1 Frameworks.mp4 46.08Мб
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.en.srt 16.95Кб
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4 176.54Мб
26-3.3 Control Types.en.srt 16.92Кб
26-3.3 Control Types.mp4 166.71Мб
27-3.4 Audits and Assessments.en.srt 10.59Кб
27-3.4 Audits and Assessments.mp4 70.37Мб
28-Learning objectives.en.srt 422б
28-Learning objectives.mp4 15.03Мб
29-4.1 Event Logs.en.srt 6.66Кб
29-4.1 Event Logs.mp4 32.18Мб
30-4.2 Syslogs.en.srt 15.17Кб
30-4.2 Syslogs.mp4 131.58Мб
31-4.3 Firewall Logs.en.srt 14.57Кб
31-4.3 Firewall Logs.mp4 193.13Мб
32-4.4 Web Application Firewall (WAF).en.srt 11.17Кб
32-4.4 Web Application Firewall (WAF).mp4 172.57Мб
33-4.5 Proxy.en.srt 22.57Кб
33-4.5 Proxy.mp4 315.31Мб
34-4.6 Intrusion Detection and Prevention (IDS_IPS).en.srt 15.20Кб
34-4.6 Intrusion Detection and Prevention (IDS_IPS).mp4 203.89Мб
35-4.7 Impact Analysis.en.srt 23.61Кб
35-4.7 Impact Analysis.mp4 461.11Мб
36-4.8 Organizations Impact vs. Localized Impact.en.srt 2.93Кб
36-4.8 Organizations Impact vs. Localized Impact.mp4 24.27Мб
37-4.9 Immediate vs. Total.en.srt 2.67Кб
37-4.9 Immediate vs. Total.mp4 16.84Мб
38-Learning objectives.en.srt 451б
38-Learning objectives.mp4 15.65Мб
39-5.1 Security Information and Event Management (SIEM) - Part 1.en.srt 11.92Кб
39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4 133.31Мб
40-5.2 Security Information and Event Management (SIEM) - Part 2.en.srt 20.55Кб
40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4 266.13Мб
41-5.3 Rule Writing.en.srt 6.27Кб
41-5.3 Rule Writing.mp4 99.46Мб
42-5.4 Known-bad Internet Protocol (IP).en.srt 5.73Кб
42-5.4 Known-bad Internet Protocol (IP).mp4 73.53Мб
43-Learning objectives.en.srt 607б
43-Learning objectives.mp4 18.51Мб
44-6.1 Malicious Payload.en.srt 22.92Кб
44-6.1 Malicious Payload.mp4 222.59Мб
45-6.2 Domain Keys Identified Mail (DKIM).en.srt 13.24Кб
45-6.2 Domain Keys Identified Mail (DKIM).mp4 158.66Мб
46-6.3 Domain-based Message.en.srt 14.76Кб
46-6.3 Domain-based Message.mp4 94.21Мб
47-6.4 Embedded Links.en.srt 5.86Кб
47-6.4 Embedded Links.mp4 54.07Мб
48-6.5 Impersonation.en.srt 1.81Кб
48-6.5 Impersonation.mp4 20.15Мб
49-6.6 Header.en.srt 3.39Кб
49-6.6 Header.mp4 77.13Мб
50-Learning objectives.en.srt 606б
50-Learning objectives.mp4 19.48Мб
51-7.1 Workflow Orchestration.en.srt 14.18Кб
51-7.1 Workflow Orchestration.mp4 172.57Мб
52-7.2 Security Orchestration.en.srt 4.25Кб
52-7.2 Security Orchestration.mp4 51.52Мб
53-7.3 Security Orchestration, Automation, and Response (SOAR).en.srt 6.42Кб
53-7.3 Security Orchestration, Automation, and Response (SOAR).mp4 80.97Мб
54-7.4 Scripting.en.srt 5.23Кб
54-7.4 Scripting.mp4 25.02Мб
55-7.5 Application Programming Interface (API) Integration.en.srt 6.39Кб
55-7.5 Application Programming Interface (API) Integration.mp4 65.42Мб
56-7.6 Automated Malware Signature Creation.en.srt 2.89Кб
56-7.6 Automated Malware Signature Creation.mp4 29.35Мб
57-7.7 Data Encrichment.en.srt 5.74Кб
57-7.7 Data Encrichment.mp4 59.69Мб
58-7.8 Threat Feed Combination.en.srt 3.60Кб
58-7.8 Threat Feed Combination.mp4 38.09Мб
59-7.9 Machine Learning.en.srt 21.93Кб
59-7.9 Machine Learning.mp4 327.16Мб
60-7.10 Security Content Automation Protocol (SCAP).en.srt 2.91Кб
60-7.10 Security Content Automation Protocol (SCAP).mp4 43.70Мб
61-7.11 Continuous Integration.en.srt 4.10Кб
61-7.11 Continuous Integration.mp4 55.54Мб
62-7.12 Continuous Deployment and Delivery.en.srt 2.18Кб
62-7.12 Continuous Deployment and Delivery.mp4 28.58Мб
63-System and Privacy Data Protection - Summary.en.srt 1.00Кб
63-System and Privacy Data Protection - Summary.mp4 28.06Мб
Bonus Resources.txt 386б
Get Bonus Downloads Here.url 180б
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент